The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/32871 | third party advisory broken link |
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc | vendor advisory |
http://securitytracker.com/id?1021276 | vdb entry third party advisory broken link |
http://osvdb.org/50137 | vdb entry broken link |
http://www.securityfocus.com/bid/32447 | vdb entry third party advisory broken link |